{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T19:32:49.054","vulnerabilities":[{"cve":{"id":"CVE-2023-42659","sourceIdentifier":"security@progress.com","published":"2023-11-07T16:15:28.923","lastModified":"2024-11-21T08:22:54.320","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"\nIn WS_FTP Server versions prior to 8.7.6 and 8.8.4, an unrestricted file upload flaw has been identified.  An authenticated Ad Hoc Transfer user has the ability to craft an API call which allows them to upload a file to a specified location on the underlying operating system hosting the WS_FTP Server application.\n"},{"lang":"es","value":"WS_FTP Server en las versiones anteriores a 8.7.6 y 8.8.4, se identificó una falla en la carga de archivos sin restricciones. Un usuario autenticado de Ad Hoc Transfer tiene la capacidad de crear una llamada API que le permite cargar un archivo en una ubicación específica en el sistema operativo subyacente que aloja la aplicación del servidor WS_FTP."}],"metrics":{"cvssMetricV31":[{"source":"security@progress.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.1,"impactScore":5.3},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@progress.com","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*","versionEndExcluding":"8.7.6","matchCriteriaId":"8424B148-39EF-483E-81F3-25A2FFF83CE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:ws_ftp_server:*:*:*:*:*:*:*:*","versionStartIncluding":"8.8.0","versionEndExcluding":"8.8.4","matchCriteriaId":"23DE01DB-BA5C-4064-88B3-99B228E1E7C9"}]}]}],"references":[{"url":"https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-November-2023","source":"security@progress.com","tags":["Vendor Advisory"]},{"url":"https://www.progress.com/ws_ftp","source":"security@progress.com","tags":["Product"]},{"url":"https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-November-2023","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.progress.com/ws_ftp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}